We take a look at different technologies and methods available for custodial platform, ranging from open-source cold-storage standards using on-chain multi-signature schemes, through Secure Multi-Party Computation to Hardware Security Modules by both legacy manufacturers and Securosys.
We also explore advantages and shortcomings of Hardware Security Modules, how they must evolve to keep up with the paradigm change introduced by cryptocurrencies to help us understand how to lead that change.
Rather than arbitrarily comparing solutions, SECUROSYS looked at various attack vectors and failure modes, and explored how different approaches help custodians defend against and prevent such events. The types of vulnerabilities SECUROSYS analyzed are: